Executing Pipes-and-Filters with Workflows

In the context of Enterprise Application Integration individual tasks have typically been implemented using specialized EAI-vendor technology based on messaging, and quite often customer-specific implementations. Those implementations prominently exploit the Pipes-and-Filters architecture. This implementation approach is in conflict with the flow technology that is a cornerstone of the Service-Oriented Architecture for solving integration problems. In this paper, we present how this conflict can be resolved. Therefore, we first analyse the differences between Pipes-and-Filters architectures and workflow approaches in general, and present the advantages and drawbacks of each solution. Afterwards, we describe how integration solutions modelled based on the PaF architecture can be implemented using flow technology by transforming the appropriate PaF elements into appropriate workflow constructs. We then present the results of appropriate tests that show that the performance of the corresponding workflows is superior to the mapping of PaF patterns to message flows. We finish off with outlining the additional tangible and non-tangible benefits that the Workflow Management System provides, such as monitoring. In a nut shell, we illustrate that the PaF architecture does not require an own implementation, but can be converted into appropriate models to workflows for execution by an appropriate system.

[1]  Harry Harris,et al.  Messaging and queueing using the MQI , 1995 .

[2]  Frank Leymann,et al.  Modeling business processes with BPEL4WS , 2004, Inf. Syst. E Bus. Manag..

[3]  Michael Franz,et al.  Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[4]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[5]  Alexander L. Wolf,et al.  Acm Sigsoft Software Engineering Notes Vol 17 No 4 Foundations for the Study of Software Architecture , 2022 .

[6]  Frank Leymann,et al.  Production Workflow: Concepts and Techniques , 1999 .

[7]  Frank Leymann,et al.  EMod: platform independent modelling, description and enactment of parameterisable EAI patterns , 2009, Enterp. Inf. Syst..

[8]  Federico Mancini,et al.  The SHIP Validator: An Annotation-Based Content-Validation Framework for Java Applications , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.

[9]  Gregor Hohpe,et al.  Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions , 2003 .

[10]  Frank Leymann,et al.  A Framework for Executable Enterprise Application Integration Patterns , 2008, IESA.

[11]  Regine Meunier,et al.  The pipes and filters architecture , 1995 .

[12]  Lars-Helge Netland,et al.  A Reflection-Based Framework for Content Validation , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[13]  Yaron Goland,et al.  Web Services Business Process Execution Language , 2009, Encyclopedia of Database Systems.

[14]  Maurice J. Bach The Design of the UNIX Operating System , 1986 .

[15]  Federico Mancini,et al.  Investigating the Limitations of Java Annotations for Input Validation , 2010, 2010 International Conference on Availability, Reliability and Security.

[16]  Mary Shaw,et al.  Software architecture - perspectives on an emerging discipline , 1996 .